Historic collaboration: Next-gen virtual infrastructure accelerates apps, boosts workloads Mark NickersonOctober 16, 20220288 views Today we are excited to announce the new HPE ProLiant with VMware vSphere® Distributed Services Engine™ developed in collaboration with VMware and AMD Pensando as the first HPE solution for VMware’s Project Monterey. This new solution enables the data processing unit (DPU) to offload services from core processors and improve application performance with a modern distributed architecture. “Together with VMware and AMD Pensando, HPE continues to define the enterprise architecture of the next decade.… Read more
Developers: Get free resources and training through the HPE Developer Community portal Dale RensingOctober 15, 20220418 views The variety of ways that developers, data scientists, and ML engineers can leverage APIs and data to create new business opportunities is boundless. But if it’s too hard, it’s not worth the struggle, right? That’s why Hewlett Packard Enterprise makes it easy to access the resources you need on the HPE Developer Community portal. Being a huge supporter of open collaboration, HPE opens the door to providing direct access to software engineering experts, APIs, documentation, tutorials, and training – all free and at your disposal anytime from anywhere.… Read more
XYPRO Presents Zero-Trust Security, Enterprise Integration, at HPE India’s BCD Steve TcherchianJune 20, 20220248 views It was an honor to be invited to speak at this year's Hewlett Packard Enterprise Business Critical Dialogue (BCD) event in Chennai, India. What an unforgettable 3 days. Read more
Getting Started with Data-centric Security Dan SimmonsDecember 6, 20210305 views With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing data, whether it is at rest or in-use, is being understood as companies realize the consequences of data breaches and non-compliance with data privacy regulations. Read more
XYPRO – Best of NonStop 2021 Steve TcherchianDecember 2, 20210302 views Have we become numb to the news of security breaches? Unfortunately, the attacks on our businesses, personal lives and even global infrastructure are not slowing down. Cybercrime is up over 600% during the pandemic. According to Verizon’s 2021 Data Breach Investigation Report, 61% of cyberattacks targeted credential theft. This far surpasses personal, banking and payment card information which have been primary targets for years. The cybersecurity industry has responded with a variety of ways to protect sensitive data with regulations, technology, and awareness, which has forced attackers to look for easier targets, such as usernames and passwords. Read more
XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop Steve TcherchianSeptember 21, 20210250 views Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are carried out. Ransomware is extremely damaging for a business due to its relatively low cost to execute and high value rate of return. Four percent might seem like a low number, but just one user falling victim to a phishing attempt is one too many.… Read more
Making the move to zero trust architecture: 4 key considerations Jeff EntersSeptember 21, 20210272 views New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved wide acceptance in the marketplace, but exactly what it entails has been a subject of debate and even some confusion. Fortunately, we’re moving beyond that now.… Read more
Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape Matt KimballSeptember 21, 20210248 views The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage for a total ransom of $70M. The cyberattack affected 800 and 1,500 organizations, disrupting IT functions for MSPs and their customers around the world. The impacted ranged from a grocery store in Sweden to a school district in Australia, and all points in between. Read more
When it comes to Digital Transformation, Don’t Forget Security Neil CorreaDecember 8, 20200282 views Digital transformation (DX) is the natural evolution of traditional business operations allowing organizations to capitalize on the full capabilities of our technological advancements, meet consumer expectations and keep competitors at bay (or at least be on par with them). DX isn’t just a cookie cutter deployment of on-prem systems migrated to the ‘cloud.’ In fact, that in itself may be considered a terrible cloud migration strategy resulting in more risk and costs (leaky S3 bucket anyone?). Read more